2011
DOI: 10.1007/s00766-011-0139-7
|View full text |Cite
|
Sign up to set email alerts
|

Requirements engineering within a large-scale security-oriented research project: lessons learned

Abstract: Requirements engineering has been recognized as a fundamental phase of the software engineering process. Nevertheless, the elicitation and analysis of requirements are often left aside in favor of architecture-driven software development. This tendency, however, can lead to issues that may affect the success of a project. This paper presents our experience gained in the elicitation and analysis of requirements in a large-scale security-oriented European research project, which was originally conceived as an ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
8
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 53 publications
1
8
0
Order By: Relevance
“…This led to a plethora of requirements-related material being produced in the first few months of the projects from two work packages (and points of view), but very few partners with a global oversight of the project. As found by Gürses et al [9], due to differing levels of experience and expectations, these materials were inconsistent. Some requirements were too detailed or unrealistic, others were too vague, and some were duplicates.…”
Section: A Initial Ad-hoc Eliciatationmentioning
confidence: 73%
See 1 more Smart Citation
“…This led to a plethora of requirements-related material being produced in the first few months of the projects from two work packages (and points of view), but very few partners with a global oversight of the project. As found by Gürses et al [9], due to differing levels of experience and expectations, these materials were inconsistent. Some requirements were too detailed or unrealistic, others were too vague, and some were duplicates.…”
Section: A Initial Ad-hoc Eliciatationmentioning
confidence: 73%
“…While the exercise was time-consuming, it was shortened by having a small, focused group that represented all stakeholders, meaning that discussions could be controlled and decisions reached more quickly. Gürses et al [9] provides some insights for validation in projects larger than DESTECS.…”
Section: A Initial Ad-hoc Eliciatationmentioning
confidence: 99%
“…For the CONie project, each of the industry partners wants to be providers of knowledge on 'how things work' in their current asset management systems. But more importantly, the industry partners see themselves as champions for the CONie development project because it provides for a comprehensive inclusion of knowledge about a wide variety of asset management systems users (Gürses, Seguran & Zannone 2013;Kenley & Harfield 2014). …”
Section: Open Standards Adoption Based On Integrating Practical Limitmentioning
confidence: 99%
“…In this instance, an ICT project, attempting to identify a generic information exchange specification for an entire building, would never have been successful. Open standards projects developed from a topdown approach (Vanhoucke 2012), without detailed domain and process-specific knowledge, are considered too general or abstract by end-users (Gürses, Seguran & Zannone 2013).…”
Section: Lessons Learned: Be Specific Not Abstractmentioning
confidence: 99%
See 1 more Smart Citation